BACKGROUND CHECKS

BACKGROUND CHECKS

Rooting Out Thieves in the Workplace 

It is estimated 30% of employees steal from their employer.

It is estimated 30% of employees steal from their employer.

Most of us have dealt with a thief during our lifetime. Devious and sneaky, some thieves behave as if stealing is an art. It is usually a theft exposing them; however, many times, they can strike numerous times before getting caught. When theft happens in the workplace, it can not only be a costly lesson but the cause of a business failing.

An estimated 30% of employees steal from their workplace affecting all types of businesses. For instance, if you are running a restaurant with $1 million sales annually, at only 4% theft within the company, your company would be losing $40,000 a year!

Employee theft costs U.S. businesses over $200 billion in annual losses. Not only are companies trying to prevent the public from stealing items, inventory, assets, and ideas from a business, they must also combat thieves on the inside. Unfortunately, 75% of employee-related crimes go undetected.

Theft can take many forms, such as: stealing money, embezzlement, unauthorized use of business or customer identity, and theft of intellectual property, such as cases of patent or trademark infringement.

Combating Theft is Knowing How Employee Theft Occurs.

Cash

Employees who have access to a cash register is the most common way employees steal from companies. If unsecured, petty cash drawers or boxes, can be an easy target for thieves.

In addition, an employee can quote a higher price than the actual price of an item and keep the difference at the point of sale.

If employees have access to credit card information or checks, theft can happen as easily as sticking a few checks inside a folder, costing the owner thousands before it is detected.

Checks and Fraud

Most banks do not verify a signature on a company check making it very easy to sign and cash a check.

Credit card fraud is a number one threat to companies and consumers because most credit card holders admittedly do not check each line item on their credit card statement.

According to the U.S. Small Business Administration (SBA), companies with less than 100 employees, lose approximately $155,000 as a result of fraud each year, a much higher rate than large companies.

Payroll

Employees may often perform actions and falsify records for work they didn’t do, such as requesting reimbursement for travel and other expenses unrelated to work. Employees may also set up fake payroll accounts for workers who have been terminated or retired. Creative thievery abounds.

Time Sheets

Time theft or “Buddy Punching” is a very popular way timesheets may easily be falsified. Individuals complete this theft by having one employee punch another employee in or out for the other.

Excessive breaks, malingering, surfing the Internet, chatting with employees or taking personal phone calls are other ways time theft occurs. While some of these things may not at first be thought of as stealing, all these actions, or inactions, can affect the bottom line and be taking advantage of an employer.

Vendor Accounts

Thieving employees will set up fake vendor accounts, submit phony invoices and issue checks for the false vendor. These checks can then be signed over to themselves and deposited. In addition, a variation would be paying a vendor $500 and writing a check to themselves, expensing the entire $500 to the vendor.

Merchandise

Loss of inventory can happen in the merchandise distribution process but can also happen before merchandise is made available to the public. Many times, employees will take items from a warehouse or newly arrived items before they are scanned into inventory software. Employees have even been known to steal entire shipping trucks containing merchandise headed to their employer’s company.

Supplies

Some employees steal smaller items such as typical office supplies, but furniture and equipment are not off limits for a thief.

Information

Many employees steal information to benefit themselves or a competitor. Types of information include: office memoranda, proprietary products, customer lists and/or other confidential data. Theft can occur by email, printing, or copying information to a flash drive or cell phone, or simply carrying it out in a purse or folder.

Sometimes, theft can be subtler, such as luring customers away, purposefully providing poor service, even spreading rumors to damage a company’s reputation and cause a down-turn in business.  All are considered losses.

While there are ways to combat theft within your company, ultimately identifying the thief before they are hired is the most effective way to reduce the occurence of theft.

The SBA recommends:  “One of the first steps to preventing fraudulent employee behavior is to make the right hiring decision.”

Background checks are a good practice for any employer, large or small, especially for those employees who will be handling cash, high-value merchandise, or have access to sensitive customer or financial data.

For over twenty-years, Thomas Lauth of Lauth Investigations International has been working nationwide and helping educate employers on methods used to combat theft.

“The first and most effective way to address theft in the workplace, is to conduct an extensive background check,” says Lauth. “A background check can provide insight into an individual’s behavior, character, and integrity.”

Which Types of Background Checks Should You Conduct?

According to the U.S. Chamber of Commerce, upwards to 30% of business failures are caused by employee theft. Thus, conducting effective, extensive background checks helps to mitigate your risk of hiring objectionable or even dangerous employees.

Not all background checks are the same. As you build a profile of your future employee, there are several kinds of background checks you should consider. For example, a criminal background check is different than checking on an individual’s credit score or military service, these require consent. A criminal background check does not require consent; however, some states have laws restricting how you use the information collected during a criminal background check.

Private investigation firms like Lauth Investigations offer complete background checks while helping you comply with the law.

Protecting Your Legal Liability with Background Checks

Smaller businesses often forego background checks for two reasons: 1. A false sense of trust and security developed by business owners working too closely with employees. 2. Most businesses do not understand the legal liabilities associated with the failure to conduct employee screening and background checks.

Any business where employees provide a direct service and interact with customers, such as contractors or daycare providers, is liable if an employee does harm to a customer and the employee has a history of wrongdoing.

A company, big and small. may not recover from this kind of lawsuit.

Choosing the Right Company to Conduct Background Checks

Protecting the interests of your workplace and customers while reducing potential liability is of utmost importance; therefore, it is vital to select a company you can trust to conduct the background screening both efficiently and thoroughly.

While employers can do some background checking of their own, working with an experienced and reputable company can ensure the reliability and thoroughness of the background screening.

Purchasing instant public records found online is not appropriate for conducting potential employee background checks. Most certainly if your hiring decision is based on tpublic record data, your company could land in hot water.

Most public databases do not fact check, clean up or refresh their data providing completely different information than received from an investigative firm experienced in conducting professional, legal and full background screening.

Private investigators have access to databases that can definitively determine if a potential employee has a criminal background.

Private investigators have access to databases to determine if a potential employee has a criminal background.

 

A reputable company providing background screening services will ensure the information you receive is current and accurate.

If a hiring decision is made based upon information found in the background check, in most cases, the company must inform the potential employee of the source used to obtain the information for the background checks (which is where using public databases can get your company in legal trouble).

What can you expect from a professional background check? According to Lauth, it’s all in the details and you pay for what you get. If you want detailed, accurate information, you will choose a Private Investigation Background Search.

Unlike a personal background search using public databases, private investigators have access to several databases providing a variety of information.

  • Employment history: This search will bring up employment records to include all positions held, making it easier to find discrepancies in a resume. It will also include salaries associated with the positions.
  • Academic and professional affiliations: Qualifications to include academic history and certification, even if the person did not complete the program.
  • Criminal records: Including a detailed outline of all criminal activity from traffic warnings and tickets to arrests and convictions. Also, these include jail time served and fines paid.
  • Financial Standing: Reflects all liens, judgments, bank accounts, current and previous property ownership, repossession of vehicles or other personal property, NSF checks and bankruptcies.

In addition to the typical information received through a personal background check, a private investigator will include:

  • Worker compensation claims an individual has filed. This can help determine the character of an individual by looking at the number of claims they have filed which could reveal a person is dishonest and fraudulent.
  • Ascertain causes of accidents or any criminal activity. DMV reports will show accident dates and basic information but do not reflect the cause. Private investigators can provide the cause behind the accident and whether criminal activity was involved.
  • Information on business and personal partners.
  • Analysis of all findings.

Relying on an Internet search is risky. A professional background screening will be more in depth than simply entering a name in a database. When a company’s future is at stake, the only way to go to obtain concise information needed to make informed decisions is a professional, private investigations extensive background check.

 

CAN HACKING BE ETHICAL?

CAN HACKING BE ETHICAL?

Written By: Kym Pasqualini, Feature Crime Writer for Lauth Investigations

(Penetration testing, intrusion testing and red teaming are some of the terms used for ethical hacking.

Penetration testing, intrusion testing and red teaming are some of the terms used for ethical hacking.

The word “hacking” almost always has negative connotations. It seems the mention of Chinese hacking, Russian hacking, or DNC hacking receives constant mention in our 24-hour news cycle.

Ethical hacking is also referred to as penetration testing, intrusion testing and red teaming, coined by the government during the 1970’s when they first hired ethical hackers to break into the United States government’s computer systems to test for vulnerabilities.

It is estimated “hackers” cost the United States more than $445 billion annually.

In a Fortune article “Data Breaches Now Cost $4 Million on Average,” according to IBM’s security division, the cost of a breach per incident has risen to $4 million, up 29% since 2013. “We’re now in a mode where these attacks are going to happen even to people that are well prepared,” said Caleb Barlow, a vice president at IBM Security.

Hackers cost the US government and corporations billions annually.

Hackers cost the US government and corporations billions annually.

According to Fortune, hackers and cybercriminals cause most breaches, and more than half of data exposures are caused by malicious attacks; the rest are caused by mistakes or glitches.

Ethical hacking is a growing profession utilized by the United States government, technology companies and other institutions.

In the field, experts refer to three major types of hackers:

  • White Hats: Security professionals or “ethical hackers” who use their expertise to strengthen a network and secure it from criminals.
  • Black Hats: Malicious hackers or “crackers” who use their skills for malevolent purposes. White hats work to protect computer structures from the Black Hats.
  • Gray Hats:Iindividuals who become white or black hats depending upon the circumstances and generally proclaim being an ethical hacker.

Many large corporations, such as IBM, employ teams of ethical hackers to keep their IT systems secure.

Why Ethical Hacking is Important

With every breach reported in the media, the need for more effective information security is becoming increasingly evident.

New technologies such as cloud computing, IT outsourcing, and enterprises must adjust their security practices and policies to combat the threat of malicious hacking. To combat threats, ethical hacking is rapidly gaining attention as an essential security practice to be performed on a regular basis.

In a public white paper entitled, “The Importance of Ethical Hacking: Emerging Threats Emphasize the Need for Holistic Treatment,” by Frost & Sullivan, it discusses top technical concerns and the role of ethical hacking in an enterprise architecture.

“The increased sophistication and success rate for recent cyber-attacks is directly related to the shift in the attacker profile, indicating that nation-states and large criminal organizations are funding well organized, highly motivated, and well-trained teams of programmers,” said Chris Rodriguez, Analyst for Frost and Sullivan. “The elevated threat landscape therefor, urgently dictates the need for a comprehensive, real-world assessment of an organization’s security posture,” said Rodriguez.

Ethical hacking provides objective analysis of an organization’s security stance for organizations of any size. Ethical hacking has become a mainstream service, as companies of all sizes pursue expert, objective, third -party analysis.

What is an Ethical Hacker?

Ethical hacking is an ambiguous term used to describe hacking performed by an individual or organization to help penetrate or gain access to identifying potential threats on a computer or a network infrastructure. In short, ethical hackers are simply computer programmers who use their skills in a constructive manner.

Ethical hackers can attempt to bypass security systems to isolate weak points malicious hackers could exploit. In the effort to eliminate or reduce potential criminal hacks, the information gained by the ethical hacker is then used by the company to make improvements to security.

Hacking LockSome may say there is no such thing as an “ethical” hacker. Simply “hacking is hacking” but the most notable hackers are known publicly as cybercriminals or computer criminals because of the damage they inflict on companies and individuals nationwide.

A highly publicized hacking incident where personal information is compromised can damage a company or organization for years.

A cybersecurity professional can have a range of expertise, anywhere from maintenance, administration, architecture, forensic investigation of secure networked systems that are increasingly necessary for the sake of operation of businesses, nonprofits, governments and medical, and educational institutions.

Even training is offered by the International Council for E-Commerce Consultants (EC-Council). The Certified Ethical Hacker (CEH) exam is made up of approximately 125 multiple choice questions and costs about $500 with additional IT certifications available. Training is entirely voluntary.

Ethics

For hacking to be ethical, a hacker must abide by the following informal rules:

  • Permission to access the network to identify potential security threats.
  • Respect individual’s right to privacy.
  • Treat all data, material, and findings as confidential.

Ethics play a vital role in hacking and differentiating innocent activities from computer crimes. Hacking is ethical if the skills are used to enhance a network system. But the issue of ethics can be very risky when one does not know a person’s motivations. With no formal code of ethics or code of honor, this void creates external forces to determine how to respond when ethical predicaments arise.

An ethical hacker will ensure the client’s IT system is properly evaluated for security issues and vulnerabilities, while protecting sensitive, personal and confidential or proprietary information. While accessing an organization’s system, the respected ethical hacker’s integrity will guide the actions of the ethical hacker.

Security Risks

While ethical hacking presents advantages to increase security to protect IT systems and assets, any organization implementing ethical hacking must consider any negative impacts that may arise from the practice.

An ethical hacker is typically contracted to hack the organization’s system. Hiring outside is usually preferred to start from scratch and simulate potential external hacks.

While there is an advantage of ethical hacking because it supports the organization’s efforts to gain more knowledge about the IT Security by identifying vulnerabilities, the main disadvantage is it presents risks of information disclosure. An outsider could intentionally or unintentionally disclose a company’s proprietary information to outside parties.

A dark side always is present where dishonest people will attempt to exploit others. Some risks of working with ethical hackers include:

  • The ethical hacker using their skills to conduct malicious hacking activities.
  • Massive security breaches.
  • Potential the ethical hacker will place malicious code, malware, viruses or other potentially damaging things on a computer system.
  • Allowing company’s financial, banking, or other proprietary information will be accessed.

Working with an Ethical Hacker

Ethical Hacker

The benefits of working with an ethical hacker are obvious; however, many are overlooked, ranging from simply preventing malicious hacking to preventing national security breaches.

Before implementing any ethical hacking, an organization must ensure the ethical hacker understands the nature of the client’s business, computer or network system. This will help guide the ethical hacker in handling any sensitive confidential or proprietary information they may encounter.

The leadership in a company or organization must determine the sensitivity or confidentiality of the information involved. This will help ensure the ethical hacker does not violate laws, rules or regulations in handling sensitive personal, financial or proprietary information.

There are several guidelines to use when working with an ethical hacker:

  1. An ethical hacker should create a plan including: identifying all networks and components they will test; detail testing intervals; detail testing process.
  2. Require transparency while working with an ethical hacker, requiring all relevant information be reported while the system or network is being accessed. Transparency ensures the client to make immediate decisions and take necessary actions to maintain the security of the system or network.
  3. Establish target areas with written work agreements requiring the ethical hacker not to work beyond those parameters to minimize exposure of sensitive information. The ethical hacker should not access other areas on the computer or networks not specified in the agreement.
  4. Developing a non-disclosure agreement may be in order prior to contracting with an ethical hacker.

Legal Risks

There are legal risks to include lawsuits involving disclosure of personal and confidential information possibly leading to a legal battle involving the organization and the hacker if the work is not done properly. Also, if the hacker makes errors compromising the IT network or company security, it is possible to negatively impact the organization’s general operations and profitability.

With cyberspace growing exponentially over the last decade, complex legal issues have led to the birth of a highly specialized branch of law.  Cyber Law or Internet Law pertains to Internet and computer technology related offenses, especially copyright infringement and fraud that involve computers, software, hardware, and information systems (IS).

The Information and Technology Act, 2000 (IT Act) covers all types of cyber-crime, including hacking as provided under sections 43 and 66 which covers negligence and computer-related offenses.

Cyber Law prevents or reduces large-scale damage from cybercriminal activities by protecting information access, communications, privacy and intellectual property.

Ethical hacking is rapidly gaining attention as an essential business practice. Regardless of risks, companies large and small benefit from the work of ethical hackers by protecting a company’s most valuable data and protecting their bottom line.

 

 

MOLES IN THE WORKPLACE

MOLES IN THE WORKPLACE

Written By: Kym Pasqualini, Feature Crime Writer for Lauth Investigations

When we think of a spy, given the national news cycle, it may conjure up thoughts of Russians or the Chinese who have been long known for hacking and espionage. However, even more common, but much less talked about, is the business mole, and almost every business in America is susceptible.

Every business sector is vulnerable to Corporate Espionage and cost American businesses billions of dollars per year.

Every business sector is vulnerable to Corporate Espionage costing businesses billions of dollars per year.

April 10, 2011, Joseph Muto was hired to work for the top-rated “O’Reilly Factor” but within 3 days, he was discovered by Fox employees to be anonymously writing for Gawker. In the span of 72 hours, Muto wrote a series of articles detailing the internal workings of the network, along with stealing and selling raw video clips. In 2013, he pled guilty to two misdemeanor charges and was dubbed the “Fox Mole.” He was fined $1000 and sentenced to over 200 hours community service. At sentencing, he said he wished he had never betrayed his former employer.

United States industries spend more on research and development of unique products and processes than any other country in the world. The key to success is having an “edge” in the business world. Whether a media company, software developing company or bakery, keeping an edge is key.

When someone steals those “trade secrets”, it is called economic espionage and costs American businesses billions annually. Damages can severely destabilize the victim company to include lost revenue, lost employment, lost investments, interruption in production, damaged reputation, and can even result in a company going out of business.

Corporate espionage conducted by spies or moles believe computers are irrelevant. It is about what data they want, what form they take, and how they can steal it.

The Company Man

The Federal Bureau of Investigation (FBI) states no business, large or small, is immune to the threat of moles and/or spies. Any proprietary process, product, or idea can be a target.

To raise awareness, the FBI in collaboration with the National Counterintelligence and Security Center has launched a nationwide campaign and released a short film called “The Company Man: Protecting America’s Secrets,” based on a true story. Mr. Moore is both unappreciated and unhappy with his career as an engineer at a glass insulation and fire-retardant firm. He is targeted on LinkedIn by a competitor who offers him a position in a rival firm. At first, Moore declines because he signed a non-compete. He is then offered $200,000 to obtain plans for equipment and formula for the glass insulation produced at his firm, RIS.

The FBI states many things drive a person to betray the company where they work.

The FBI states many things drive a person to betray the company where they work.

Moore makes the decision to go to his current boss who then contacts the FBI who initiates a sting. A true story, there was an arrest in the case. However, this may not be the decision every employee would make – which makes every employee a liability in a 400 billion, in the dark. underbelly of America’s global economy.

Spotting Insider Threats

What drives a mole? The FBI states company moles are often “overwhelmed by life-crisis or career disappointment” driving them to leak information.

With email, cell phones, and jump drives, stealing information is far easier than in the past. Greed and financial need, unhappiness at work, the promise of a better job, drug or alcohol abuse, and/or vulnerability to blackmail, can all be contributors, says the FBI.

listener

The FBI says employees who leak trade secrets, such as plans, customer databases, etc. will exhibit behaviors other employees can often identify to help prevent breaches.

Your employees may be the first line of protection when combatting the insider threat.

 

 

Potential Indicators:

  • Drastic changes in behavior, demeanor, or work habits.
  • Unexplained affluence.
  • Financial hardship.
  • Substance abuse.
  • Attempts to circumvent security procedures.
  • Long hours at the office without authorization.
  • Taking home proprietary information.
  • Unnecessarily copying materials.
  • Using an unauthorized USB drive.
  • Unusual use of cell phone during business hours.
  • Asking inappropriate questions.
  • Suspicious relationships with competitors.
  • Leaving traps to detect searches of their office.

Based on FBI’s studies, additionally, there are more subtle things to look for:

  • Someone hired to steal company information will be experienced in the operation of a business and will be able to identify the value of your company’s trade secrets.
  • Corporate spies are everyone’s friend. To gain access to a company in order to steal information, a mole will be socially adept with the ability to manipulate people to gain their trust.
  • Individuals who are frequently wandering or talking in locations they do not need to be to complete their job. Someone who reflects a pattern will always have a reasonable excuse as to why they are not in the correct area or talking to specific employees.
  • Employees who keep trying to re-open decisions already settled and question advisability of decisions.
  • They act envious.

Vulnerabilities – Getting Access

Once inside, a mole has a lot of ways to access sensitive information. Spies can even work in pairs, possibly one as a consultant and the other an employee. When you have valuable information, never underestimate the methods others will use to gain access to it.

Spying can be as easy as photocopying papers found on unattended desks or at printers. Walking into an empty meeting room with a laptop and pulling data off the network.

A common ploy is pretending to be an employee. Another ploy often used, posing as IT personnel because it enables the individual to look legitimate while accessing network access points and sitting at someone’s computer. In other cases, spies have posed as cleaning staff, gaining access after-hours.

Criminals capitalize on the common assumption if you are in the building, you must be okay. Investing in your company’s staff to raise awareness is the best investment a company can make.

According to InfoWorld, Peter Wood, Chief of Operations at First Base Technologies, a U.K. based consultant firm performing ethical hacking services, “Spies are interested in anything from financial data to intellectual property and customer data. They might steal information for blackmail purposes, but the most common motive for physical intrusion is industrial espionage.”

Wood says the most common way to intrude upon a company is posing as an employee or a visitor, even creating convincing costumes to pose as a legitimate visitor such as telephone, electrical or maintenance person, a burglar alarm inspector, even someone from the fire department.

Protecting Your Trade Secrets

The FBI lists several ways to protect your workplace from insider threats.

  • Recognize the threat.
  • Identify and value trade secrets.
  • Implement a definable plan for safeguarding trade secrets.
  • Secure physical trade secrets and limit access to trade secrets.
  • Provide ongoing security training to employees.
  • Use protective tools such as screensavers with password controls.
  • Classify information and store accordingly.
  • Secure the workplace so visitors do not have access without security screening.
  • Encrypt data and require strong passwords for employees with liberal access rights.
  • Develop an insider threat program.
  • Proactively report suspicious incidents to the FBI before your proprietary information is irreversibly compromised.
  • Ask the FBI or other security professionals for additional awareness training.

At times, companies are hesitant to report such activity for fear they will risk their trade secrets being disclosed in court or compromised in any way. The FBI will do all it can to minimize business disruption, safeguard data and privacy, and will seek protective orders to preserve business confidentiality and sensitive information. The Department of Justice also has a variety of protections in place to ensure information is protected during a criminal prosecution.

 

TITLE IX INVESTIGATIONS AND SEXUAL MISCONDUCT

TITLE IX INVESTIGATIONS AND SEXUAL MISCONDUCT

By: Kym Pasqualini, Feature Writer for Lauth Investigations

Scandals can arise anywhere, especially in the workplace, and schools are especially vulnerable. Allegations of sexual misconduct, assault and other accusations violating workplace compliance and law, have severe civil and criminal liability.

We have all heard about sports-related and college scandals, and the newly and highly publicized accusations against Harvey Weinstein that seemingly were permitted to go on for years without anyone acting. These situations can create not only a media frenzy, social media ubiquity and significant liability within a company.  How complaints are handled can affect an institution’s reputation for years.

Institutional leadership has a moral, ethical and legal obligation to protect students and employees.

Institutional leadership has a moral, ethical and legal obligation to protect students and employees.

Most importantly, it is the responsibility of an institution to protect their students and employees, and the leadership has a legal, moral and ethical obligation to do so.

An institution’s investigative process, in response to sexual assault or misconduct, needs to be geared toward determining what happened without having preconceived notions of the outcome. The process should be consistently applied, clearly documented, and show the steps followed in achieving the conclusion.

Maintaining a record of this process and the findings is critical to minimizing risk should there be a consequent lawsuit or investigation by an outside entity.

Title IX

President Richard M. Nixon signed Title IX Educational Amendments of 1972 as a comprehensive federal law prohibiting discrimination on the basis of sex in any federally funded education program or activity. In addition, protecting employees and students from sexual misconduct.

Sexual assault and misconduct investigations not meeting legal standards are increasingly resulting in very costly claims. Ensuring Title IX compliance is the best way to minimize risk.

In a 2011, “Dear Colleague” letter (DCL) was issued by the U.S. Department of Education’s Office for Civil Rights (OCR). According to the letter, investigations must be:

  1. Prompt – The DCL defines the meaning of “prompt” as conducting an investigation within 60 days, acknowledging more complex cases may require more time. 
  1. Thorough – OCR mandates a case must be “thorough” and the investigation must be conducted in good faith. The employer must have legal grounds to believe the employee participated in misconduct before any disciplinary action is taken.
Courts expect a thorough and adequate investigation in all sexual assault and misconduct cases.

Courts expect a thorough and adequate investigation in all sexual assault and misconduct cases.

Courts do not focus on whether the employer made the right conclusion but instead, examine the determining process used to ensure the investigation was adequately thorough. For example, analyzing the type and number of interviews conducted, confidentially of the interviews, were they handwritten or recorded and how. The court also notes if the investigator asked non-leading, open-ended questions; encouraged witnesses to clarify or correct testimony; or challenged information provided by witnesses.

Small mistakes may not damage an investigation; however, a case could be considered inadequate simply on the pretense an individual lacked prior experience investigating sexual harassment cases or failed to adequately explore the allegations.

  1. Impartial – It is necessary to remain impartial. For example, the person who made the complaint should not be a supervisor over the individual investigating the complaint. A qualified investigator should always be used to investigate sexual assault and harassment complaints, one who can remain objective and has no stake in the outcome of the case.

There are two recommended models of investigation to be conducted by a trained investigator understanding of the evidence needed to sustain or disprove allegations.

What Are The Numbers?

The Chronicle of Higher Education (CHE) tracks federal investigations of colleges for potential violations of the gender-equity law Title IX involving alleged sexual violence. According to CHE, as of January 10, 2018, there were 337 sexual violence cases under investigation at 243 postsecondary institutions.

A campus investigation differs from a police investigation; however, both can occur at the same time. It just depends on where the victim reports the assault. A victim may feel more comfortable going to campus police than law enforcement for fear they may be doubted or blamed, especially in cases of rape by an acquaintance. Though advocates fear victims being discouraged from coming forward, in several states, lawmakers are now proposing colleges be required to notify law enforcement.

Pre-Investigation

In this model, the investigator meets individually with both parties and witnesses prior to any hearing and provides the information to a panel or hearing official. The goal is to maximize the information obtained during the interview process by questioning parties and witnesses privately to minimize stress for the participants, while also protecting testimony.

Prior-Hearing Investigative Process

The other common model, the investigation is part of the hearing process where an official panel or hearing official questions witnesses, hears testimony, reviews documents and evidence, and makes a conclusion.

While this model may work well for some institutions, it tends to be viewed as adversarial and may affect the overall reliability of the case.

According to United Education’s EduRisk program, while it is the institution’s responsibility to investigate alleged sexual assaults or harassment, and decide if discipline is warranted, this model can inappropriately burden the parties to present their cases by identifying witnesses and evidence for school officials to consider. In addition, most school officials are not trained investigators or private detectives with experience working with such sensitive circumstances.

Proper Documentation

Writing ImageThe institution has the responsibility to properly document its investigation of any sexual misconduct allegation to provide a reliable record of all evidence the findings are based. This is especially critical when an allegation may appear meritless on the surface.

Though courts do not favor one method of documenting interviews, ideally, in addition to a final report, an investigator should provide a summarization of evidence, assessment of credibility of witnesses interviewed, and contain only factual conclusions.

Policies and Procedures

Given the importance of sexual assault and other misconduct allegations, it is necessary to have the appropriate policy and procedures to demonstrate the institution’s commitment to the safety of its employees and students, help prevent avoidable crises and support an efficient and effective response.

It is vital to understand when an investigation is warranted, and the purpose of the investigations, to include planning and organizing.

Every institution or company should have policies in place specifically addressing suspected misconduct to help respond reasonably with guidance as to how staff should respond and recommended to utilize experts to help identify vulnerabilities that may exist in an institutions current policies and procedure.

What a Federal Investigation Entails

To most onlookers, the federal investigation process of an institution is opaque. The OCR informs a college it is under investigation and informs whether it is based upon a compliance review or complaint. When it is a complaint, typically, the complainant’s information is not made available.

Federal officials require a great deal of information, such as policies, training material, investigative reports, interviews, incident reports, hearing documents. They will visit the campus to meet with both students and employees as well.

Some OCR investigations can conclude quietly, with an “administrative closure,” “early complaint resolution,” or “insufficient evidence.” Other investigations can result is a letter of findings, not seen until the conclusion, along with a “negotiated resolution agreement” that details policies and procedures a college must change or adopt. To comply, these often require implementing or expanding training programs for faculty, students, and staff, along with modifying policy and procedure.

Investigations are getting tougher. The OCR will likely monitor the college’s progress for years to come.

The best way to avoid investigative, policy and procedure pitfalls is to respond appropriately the first time using a professional investigative agency or experienced private investigator.

Fair and Independent Investigations

Lauth Investigations Sexual Harassment Division is headed by founder Thomas Lauth who has extensive experience investigating sexual misconduct.

One thing has become abundantly clear, after watching the numerous news stories covering sexual assault and harassment, is remaining mindful of the sensitivities involved in such an investigation, making it necessary to address each client’s needs. In addition, a rapid response,  both thorough and professional, is necessary so as not to cause more harm.

Sexual assault and other misconduct has serious psychological consequences on the victim. Lauth Investigations professionally conducts sensitive internal investigations related to sexual assault and misconduct with utmost integrity. Our private investigators take great care to develop facts, determine credibility, and reach findings with objectivity and independence, while also exercising discretion and sensitivity.

During an investigation, Lauth Investigations expert private investigators will interview the complainant and witnesses, examine relevant documents, obtain written statements, medical records, email and other communication. At conclusion, a confidential report is delivered to include finding and recommendations that adhere to court and panel oversight.

Title IX investigations differ from a law enforcement investigation, and critical in the initial phase to ensure evidence is preserved, whether it be physical evidence, video surveillance or other important aspects of a proper investigation. Lauth investigators will ensure the investigation is treated with utmost integrity so as not to compromise the investigation.

Our experts can also evaluate and provide recommendations of current policies and procedures to help strengthen the response to sexual assault and misconduct.

 

 

OLYMPUS DIGITAL CAMERAThomas Lauth

Investigations Division

Email: tlauth.investigations@gmail.com

Tel: 317.951.1100

Gangs in the Workplace: Corporate Investigations

Gangs in the Workplace: Corporate Investigations

By: Kym Pasqualini, Feature Crime Writer for Lauth Investigations

The days of red and blue handkerchiefs, baggy pants, graffiti, rap-music, and drive-by shootings are no longer such a popular sub-culture. Believe it or not, the new kind of gangsters hold college degrees, work and hold jobs in offices, warehouses, even government positions and police departments. They are a more sophisticated criminal and have infiltrated corporate America.

corporate gang

No more baggy pants. Today, you are more apt to find a gang member wearing black patent leather shoes.

If you think this is not a possibility in your own company, think again. No industry or company is exempt. A University of Chicago study found gangs have increasingly adopted a clean-cut appearance while replicating techniques used by organized crime.

Described as “very sophisticated and well organized” by the Federal Bureau of Investigation (FBI), they estimate there are 33,000 violent street gangs with 1.4 million members nationwide. You can safely double that number if you count affiliates and wannabes. The number has risen steeply, up from 1996 where an estimated 400,000 gang members were accounted for in the University of Chicago study.If you think this is not a possibility in your own company, think again. No industry or company is exempt. A University of Chicago study found gangs have increasingly adopted a clean-cut appearance while replicating techniques used by organized crime.

Well-known companies, Chicago Police Department, the United States Post Office, major pharmaceutical companies, and even the Social Security Administration have found gang members within their ranks carrying out complex illegal operations netting millions annually.

According to the FBI 2015, National Gang Report (NGR), gangs have gained employment in the U.S. Military, law enforcement, corrections, and even judiciary.

From the Streets to a Global Crime Empire

Typically, gangs are known for drug trafficking, robbery, gun trafficking, intimidation rackets, prostitution, human trafficking, fraud and other crimes you may think would not infiltrate a common company. Now, they are. However gangs are concentrating their efforts on white-collar crime due to weaker sentencing guidelines and ease of making money.

The term “gang activity” involves identity theft, credit card fraud, prescription drug fraud, trafficking stolen goods, money laundering, mortgage fraud, Social Security Administration fraud, tax fraud, counterfeiting, and securities marketing manipulation. Where there is access, there will be individuals willing to participate in capitalizing and even selling their access to those interested in exploiting the system.

credit card
In New Jersey, the 111 Neighborhood Crips used a machine to make gift cards they distributed to grocery stores, pharmacies and other stores. Grand larceny accounts for 40% of all crime in the United States during 2014.

In 2015, the Outlaw Gangsta Crips in NYC made approximately $500,000 in a paycheck fraud scheme by obtaining a legitimate paycheck from an employee and using the information to create and cash counterfeit checks.

From 2004 through 2009, fraud investigations alone increased 33%, bringing losses associated with those schemes into the billions of dollars.

According to Fox Business, Gangs such as the Bloods, Crips and La Nuestra Familia are undertaking white-collar crime. They are recruiting members that possess the necessary skill-sets, according to the FBI.

When you think gangster, images of Joe Pesci and Robert De Niro, maybe even Snoop Dog, may come to mind, not the impeccably dressed executive working in a high finance position. Or, the nicely dressed woman at the bank who knows how much you deposit weekly or the amount of your company’s payroll.

In a Workforce Magazine article, “Have Gangs Invaded Your Workplace,” during 1995, California, Silicon Valley firms alone were hit with more than 50 armed robberies of microchips and electronic components with the average heist netting the robbers $400,000. “There’s a growing level of sophistication and opportunism,” says Keith Lowry, a detective in the High-Tech Crime Unit of the San Jose Police Department.

Gang members are becoming harder to weed out in the hiring process, much of the time because we commonly think of “gang members” as looking like street thugs, and these old stereotypes are costing companies billions annually.

guy in suit

Weeding out white-collar gang members has become increasingly difficult.

Any company can become a target or an opportunity to engage in illegal activities, like dealing drugs, theft of property or personal information, extortion. Gangs have learned they can make a lot more money by being well-dressed, educated, and articulate.

For instance, electronics firms are easy targets. A microchip or computer processor weighing less than an ounce can score several hundred dollars on the street. The sentence for being charged with a stolen microchip much less than selling an ounce of drugs.

Some gangs plant members within a company in specific department such as infiltrating dispatching, shipping or the financial departments. They can also pose as temporary workers or work for outside vendors to gain access to numerous companies.

In addition, the growing trend toward outsourcing can often lead to less control over merchandise, files, and information.

According to a Fox Business article “From the Streets to Cyberspace: U.S. Gangs Turn to White Collar Crime,” the FBI says, “Gangs are more adaptable, organized, sophisticated, and opportunistic, exploiting new and advanced technology as a means to recruit, communicate discreetly, target their rivals and perpetuate their criminal activity.”

Facebook has become the preferred method for gang members to communicate according to the FBI. “The proliferation of social networking websites has made gang activity more prevalent and lethal – moving gangs from the streets to cyberspace,” says the FBI.

Arming Your Human Resources Department

Much of the solution lies in ensuring Human Resources procedures are effective. Of course, background checks and screening procedures are vital but is there more to be done to detect a potential criminal trying to infiltrate your workforce? The first thing to keep in mind – you get what you pay for and being lax can cost you.

Local criminal checks are almost worthless; however, a full criminal screening can pay off. In addition, many applicants may have earned their GED in prison, with some digging, their history can be discovered.

Many companies cut corners and haphazardly follow procedures when screening applicants not realizing dealing with the aftermath can result in costing more when you compare it to properly vetting applicants the first time around.

Additionally, letting your applicants know you will be conducting a thorough background, previous employment, driving records, verifying degrees, criminal record check, and reference checks can also discourage many applicants from pursuing the position in the first place, which ultimately saves your company time and costs associated with the screening process.

What is important to consider is applying an effective screening procedure to contractors, consultants and temporary employees depending upon how much access they may be granted, as well as, the time they will be spending at your company.

Trusting a “temp agency” is conducting the appropriate background checks is a potential liability for your company.

Educating your employees on how to spot gang activity and how to handle it is crucial. Some companies have found having training sessions and employee meetings add to their success combatting gangs in the workplace.

Experts agree loyalty to gangs overrides loyalty to an employer. Even though they may try hard to blend in they may still slip occasionally and there are some recommendations or even subtle things to monitor.

  1. Does your employee reside in a known gang area?
  2. Is your employee responsible? Too much time on the phone or arrive late?
  3. Does your employee go by a nickname and have nicknames for friends?
  4. Do the clothes, colors or insignias stay consistent?
  5. Does your employee have visitors at work, friend or family?
  6. Have you noticed any graffiti in or around your workplace?
  7. Does your employee use verbal, hand or walking mannerisms that could be associated with gang activity?
  8. Is your employee on parole or probation?

Being a girlfriend of a gang member or being a current or former gang member is not against the law, but it could be a sign of other activity that could be detected if your HR department is cognizant of the many issues that face companies if infiltrated.

Using Private Investigators to Combat Gang Intrusion in the Workplace

Private investigators are a commonly used tool in the arsenal to combat “gang intrusion” along with malingering, theft or fraud in the workplace.

Along with surveillance and providing evidence, they can also evaluate your HR department’s policy and procedures through undercover placement or working along with the HR department to tighten up the reigns to reduce incidents of crime.

Many times, it is recommended to have a private investigator apply for employment without informing anyone in your company to best determine where weaknesses exist in the hiring process. Were all the references called? What questions were asked? Were the proper background checks completed?

It may be necessary to start at the beginning of the hiring process. In addition, private investigators can be placed in certain departments where there have been discrepancies identified to collect evidence admissible in a Court of law. It is an extra layer of protection when investigating activities at your company without violating privacy laws.

When a company suspects criminal activity, it is advantageous to hire a professional who will work with police if the legitimate criminal activity is, in fact, detected. Abuse of sick leave or malingering costs companies billions of dollars a year. This is enough to warrant the hiring of a private detective to legally document the behavior.

From filming a guy talking about starting his new business and hinting at using the employer’s database, to a meat manufacturing plant taking a cut of the supplier’s delivery, to the employee watching porn on the company computers, a private investigator can take the care needed to conduct an internal investigation legally, ultimately protecting your company and saving you a lot of money.